IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also hig...
Saved in:
| Published in: | International journal of advanced research in computer science Vol. 16; no. 4; pp. 57 - 62 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
Udaipur
International Journal of Advanced Research in Computer Science
20.08.2025
|
| Subjects: | |
| ISSN: | 0976-5697, 0976-5697 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX. |
|---|---|
| AbstractList | : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX. The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the process of predicting the key very difficult. 2. Ensuring the integrity and reliability of the transmitted data using the HMAC-HASH256 algorithm that is resistant to attacks, where the 256 hash function is used with a key generated from the Diffie-Hellman Ephemeral algorithm. 3. Analyzing the system by trying to measuring the impact of using encryption with authentication on cost and speed and calculating the time taken to implement the HMAC-SHA256 algorithm. System implementation was done by using IntelliJ IDEA with java FX. |
| Author | Mustafa, Nada Abdul Aziz |
| Author_xml | – sequence: 1 givenname: Nada Abdul Aziz surname: Mustafa fullname: Mustafa, Nada Abdul Aziz |
| BookMark | eNpNkE1PwjAYxxujiYh8AU9NvDrs2q3rjnUbdMleCBQTTk032wSiDDsx8ds7wIPP5XkO_5c8vztwve_2BoAHH00xDRh53u60a_vpt0-3wTQiKLwCIxRH1AtpHF3_u2_BpO93aBgSxzRAI6DzcrGsXzOYcslhViXLzULmdQVfNnC9yqs5TPPZLM88kRVFySvIqxSmFYe8mNfLXIpy9QT5WoqsknnCZZaenKLkiSf4SuCQ3oMbq997M_nbY7CeZTIRXlHPB0fhtb4fhp4lrNGBbiLLLCYUadtqigIaEksoM5Qx_w01jGFkkWYtNrbRBkXUmqZp46ghY_B4yT247vNo-i-1645uP1QqggOfDE_jYFDhi6p1Xd87Y9XBbT-0-1E-Umea6kJTnWmqE03yC8bJYwA |
| ContentType | Journal Article |
| Copyright | 2025. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2025. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| CorporateAuthor | Information Technology section University of Baghdad, Collage of Languages Baghdad, Iraq |
| CorporateAuthor_xml | – name: Information Technology section University of Baghdad, Collage of Languages Baghdad, Iraq |
| DBID | AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI Q9U |
| DOI | 10.26483/ijarcs.v16i4.7305 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Database Suite (ProQuest) ProQuest Technology Collection ProQuest One ProQuest Central ProQuest Central Student SciTech Collection (ProQuest) ProQuest Computer Science Collection Computer Science Database (ProQuest) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 0976-5697 |
| EndPage | 62 |
| ExternalDocumentID | 10_26483_ijarcs_v16i4_7305 |
| GroupedDBID | .4S .DC 8FE 8FG AAYXX ABUWG AFFHD AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO EOJEC GNUQQ HCIFZ K6V K7- MK~ ML~ OBODZ OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC QM1 QO4 TUS 3V. 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D M0N PKEHL PQEST PQUKI PUEGO Q9U |
| ID | FETCH-LOGICAL-c1155-f38ba4ab7f8f2360afca604653f368e6881d0b8820f0a8c2efbae076febbc97b3 |
| IEDL.DBID | P5Z |
| ISSN | 0976-5697 |
| IngestDate | Sat Aug 23 12:56:58 EDT 2025 Sat Nov 29 07:36:02 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1155-f38ba4ab7f8f2360afca604653f368e6881d0b8820f0a8c2efbae076febbc97b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/3241300024?pq-origsite=%requestingapplication% |
| PQID | 3241300024 |
| PQPubID | 1606379 |
| PageCount | 6 |
| ParticipantIDs | proquest_journals_3241300024 crossref_primary_10_26483_ijarcs_v16i4_7305 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-08-20 |
| PublicationDateYYYYMMDD | 2025-08-20 |
| PublicationDate_xml | – month: 08 year: 2025 text: 2025-08-20 day: 20 |
| PublicationDecade | 2020 |
| PublicationPlace | Udaipur |
| PublicationPlace_xml | – name: Udaipur |
| PublicationTitle | International journal of advanced research in computer science |
| PublicationYear | 2025 |
| Publisher | International Journal of Advanced Research in Computer Science |
| Publisher_xml | – name: International Journal of Advanced Research in Computer Science |
| SSID | ssj0000399640 |
| Score | 2.3007462 |
| Snippet | : The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications.... The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications.... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Index Database |
| StartPage | 57 |
| SubjectTerms | Algorithms Authentication Data encryption Encryption Energy consumption Hash based algorithms |
| Title | IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256 |
| URI | https://www.proquest.com/docview/3241300024 |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 0976-5697 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000399640 issn: 0976-5697 databaseCode: P5Z dateStart: 20100501 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database (ProQuest) customDbUrl: eissn: 0976-5697 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000399640 issn: 0976-5697 databaseCode: K7- dateStart: 20100501 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 0976-5697 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000399640 issn: 0976-5697 databaseCode: BENPR dateStart: 20100501 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 0976-5697 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000399640 issn: 0976-5697 databaseCode: PIMPY dateStart: 20100501 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED7xGlh4I56VBzYwmMSxnQmZJiUVbYhKQZQlSpxYKkMpLfD7sdMUxMLCEkWJLFl357vPd_Z9ACfc0waXexT7lBSYcuZjnxTmIZjvMHXJM1dVZBM8jsXTk5_UCbdpfaxy7hMrR128Kpsjv3CrApANKVfjN2xZo2x1tabQWIRl2yXBUjck3vN3joWY6Msomd2VsUe53Ivhi7Gf6fnnJRvSc2Pd3u949NsdVzGmtf7f2W3AWo0ukZyZwyYslKMtWJ8zN6B6IW9D1u4mvbvHEAWyL1EYN3uDxOaq0PUAWSKOGxS0W612iKOw0-nKGMk4QEEskezc3PXa_ah7f4aMaUdh3LdXkcPAjoy6sokjeR8ZgLMDD62w34xwTbaAlQGFHtauyDOa5VwL7biMZFpljNjua9plomTCAFuSGzxONMmEckqdZyXhTJd5rnyeu7uwNHodlXuAzBAqHFUUhXlhVPuEKi5sgbfQ2jjffTidizwdz3pqpGYvUikonSkorRSUWgXtw9Fc5Gm9vqbpj7wP_v59CKuOZewl1h8cwdL75KM8hhX1-T6cThqwfB3GSa8Bi7ccNyrjMd8So4PBF4SoxUs |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQXylMUCvgAJ3DrJl7bOSBkNtkm2iRdbUPVnkLixNJy2JZuKeJP8RsZJxtQL9x64BJFihwlnm8envH4A3gjRxbj8hGnAWcN5VIENGANXpQIPGH2ZeWbjmxC5rk6OQlmG_Br6IVx2yoHm9gZ6ubMuBz5nt8VgJxL-Xj-jTrWKFddHSg0elhM258_cMm2-pCEKN-3njeJinFM16wC1GD0M6LWV3XFq1paZT1fsMqaSjB3zJj1hWqFwgiO1Rh4MssqZbzW1lWLq33b1rUJZO3je2_Bbe4r6fRqKumfnA5Dby8463tz3NYxf2_xFT9stXu1LxZ8F7VpdN3_XTf_nU-bbP1vs_EA7q-jZ6J7uD-EjXb5CLYGZgqyNlSPoUqy2fzwOCKhLjSJ8vH8dOZyceTTKXFEIwckTCaTJKJxlKaZzonOQxLmmuj04HCeFHF29J6g6sZRXrhW6yh0I-NMj2msj2IM4J7A5xv50aewuTxbts-A4BCuPNM0Dd4IbgPGjVSugN1Yi85lG94NIi7P-zNDSlxrdYAoe0CUHSBKB4ht2BlEXK7tx6r8K9_n_378Gu7GRZaWaZJPX8A9z7ETM2f7dmDz8uJ7-xLumKvLxeriVQdVAl9uGg2_AUo4H5E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=IMPROVE+DATA+ENCRYPTION+BY+USING+DIFFIE-HELLMAN+AND+DNA+ALGORITHMS%2C+AUTHENTICATED+BY+HMAC-HASH256&rft.jtitle=International+journal+of+advanced+research+in+computer+science&rft.au=Nada+Abdul+Aziz+Mustafa&rft.au=Al-Quraishi%2C+Ali+T&rft.date=2025-08-20&rft.pub=International+Journal+of+Advanced+Research+in+Computer+Science&rft.eissn=0976-5697&rft.volume=16&rft.issue=4&rft.spage=57&rft_id=info:doi/10.26483%2Fijarcs.v16i4.7305 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0976-5697&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0976-5697&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0976-5697&client=summon |